{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T09:40:21Z","timestamp":1695807621026},"reference-count":30,"publisher":"Wiley","issue":"7","license":[{"start":{"date-parts":[[2003,3,28]],"date-time":"2003-03-28T00:00:00Z","timestamp":1048809600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Am. Soc. Inf. Sci."],"published-print":{"date-parts":[[2003,5]]},"abstract":"Abstract<\/jats:title>Sequential patterns refer to the frequently occurring patterns related to time or other sequences, and have been widely applied to solving decision problems. For example, they can help managers determine which items were bought after some items had been bought. However, since fuzzy sequential patterns described by natural language are one type of fuzzy knowledge representation, they are helpful in building a prototype fuzzy knowledge base in a business. Moreover, each fuzzy sequential pattern consisting of several fuzzy sets described by the natural language is well suited for the thinking of human subjects and will help to increase the flexibility for users in making decisions. Additionally, since the comprehensibility of fuzzy representation by human users is a criterion in designing a fuzzy system, the simple fuzzy partition method is preferable. In this method, each attribute is partitioned by its various fuzzy sets with pre\u2010specified membership functions. The advantage of the simple fuzzy partition method is that the linguistic interpretation of each fuzzy set is easily obtained. The main aim of this paper is exactly to propose a fuzzy data mining technique to discover fuzzy sequential patterns by using the simple partition method. Two numerical examples are utilized to demonstrate the usefulness of the proposed method.<\/jats:p>","DOI":"10.1002\/asi.10258","type":"journal-article","created":{"date-parts":[[2003,4,14]],"date-time":"2003-04-14T10:02:45Z","timestamp":1050314565000},"page":"660-670","source":"Crossref","is-referenced-by-count":5,"title":["A novel method for discovering fuzzy sequential patterns using the simple fuzzy partition method"],"prefix":"10.1002","volume":"54","author":[{"given":"Ruey\u2010Shun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yi\u2010Chung","family":"Hu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2003,4,11]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"crossref","unstructured":"Agrawal R. Imielinski T. &Swami A.(1993).Mining association rules between sets of items in frequent databases. In Proceedings of the ACM SIGMOD International Conference on Management of Data 1993 (pp.207\u2010216). Washington D.C.","DOI":"10.1145\/170035.170072"},{"key":"e_1_2_7_3_1","first-page":"307","volume-title":"Advances in knowledge discovery and data mining","author":"Agrawal R.","year":"1996"},{"key":"e_1_2_7_4_1","doi-asserted-by":"crossref","unstructured":"Agrawal R. &Srikant R.(1995).Mining sequential patterns. In Proceedings of the Eleventh International Conference on Data Engineering 1995 (pp.3\u201314). Taipei Taiwan.","DOI":"10.1109\/ICDE.1995.380415"},{"key":"e_1_2_7_5_1","volume-title":"Data mining techniques: for marketing, sales, and customer support","author":"Berry M.","year":"1997"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0450-1"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/3477.604117"},{"key":"e_1_2_7_8_1","volume-title":"Data mining: concepts and techniques","author":"Han J.W.","year":"2001"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/91.388168"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(00)00024-5"},{"issue":"5","key":"e_1_2_7_11_1","first-page":"679","article-title":"Generating learning sequences for decision makers through data mining and competence set expansion","volume":"32","author":"Hu Y.C.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-8352(02)00136-5"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/3477.790443"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(01)00144-X"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/91.413232"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(99)00070-6"},{"key":"e_1_2_7_17_1","doi-asserted-by":"crossref","unstructured":"Ishibuchi H. Yamamoto T. &Nakashima T.(2001).Fuzzy data mining: effect of fuzzy discretization. In Proceedings of the 1st IEEE International Conference on Data Mining San Jose CA 2001 pp.241\u2013248.","DOI":"10.1109\/ICDM.2001.989525"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/21.256541"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.364486"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/345124.345167"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(94)90003-5"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3926.001.0001"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(99)00090-9"},{"key":"e_1_2_7_24_1","volume-title":"The analytic hierarchy process: planning, priority setting, resource allocation","author":"Saaty T.L.","year":"1980"},{"key":"e_1_2_7_25_1","volume-title":"Applied multivariate techniques","author":"Sharma S.","year":"1996"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/91.273127"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(75)90036-5"},{"key":"e_1_2_7_29_1","volume-title":"Fuzzy sets, decision making, and expert systems","author":"Zimmermann H.\u2010J.","year":"1991"},{"key":"e_1_2_7_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-8702-0"},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/21.199466"}],"container-title":["Journal of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fasi.10258","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.10258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T03:08:28Z","timestamp":1695697708000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/asi.10258"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,4,11]]},"references-count":30,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2003,5]]}},"alternative-id":["10.1002\/asi.10258"],"URL":"https:\/\/doi.org\/10.1002\/asi.10258","archive":["Portico"],"relation":{},"ISSN":["1532-2882","1532-2890"],"issn-type":[{"value":"1532-2882","type":"print"},{"value":"1532-2890","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003,4,11]]}}}